The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
During last two decades, Mobile Ad hoc Networks (MANETs) has been in widespread use. However, in some critical applications such as in battlefield or area sensing, due to the node mobility, limited power and sparse deployment density, MANETs may suffer network partitioning. Without a stable end to end path, these challenged scenarios could cause most existing ad hoc networks protocols to fail. In...
In this paper, the problems facing designers of peer-to-peer instant messaging protocols, specifically those intended to run over mobile ad-hoc networks, are discussed. In particular, the challenges of identity management and presence dissemination are addressed, with an efficient and user-friendly protocol described that solves them. As a side effect, a form of social network mining is offered that...
To alleviate the data collection latency problem in mobile WSNs, we shorten the data collection path by visiting a minimal set of points in the network, which we call the {\it Stop Point Set} (SPS). A point selection method named path-points identification method has been proposed recently, which plays the same role as our SPS calculating method. However, as a clustering based method, it may not scale...
Due to the rapidly changing topology of vehicular ad hoc network (VANET), it requires the routing protocol can be able to find out comparatively more stable routes. But the routing protocols in existence are not taking the distinguishing features of vehicles and roadway into consideration, and this brought about challenges to these routing protocols' applicability in VANET. In this paper, we take...
Mobile ad hoc networks are a wireless network in which each node is vested with the responsibility to act as a router. The individual nodes are constrained by the resources such as battery power. To achieve maximum throughput with the available resources the nodes might behave selfishly. This could lead to severe performance degradation in network throughput, packet delivery ratio, packet loss increment,...
In recent years, investigations on ad hoc networks have received considerable interest due to its capability to deploy quickly without any infrastructure. And with the development of mobile terminal, mobile CSCW gradually becomes the developing direction of CSCW. The ad hoc networks' characteristics and the traditional CSCW's sharing mechanism are introduced at first. And then put forward the theory...
Network quality of VANET (Vehicular Ad-hoc Network) is usually bad due to speed variation, high mobility, driver behavior, traffic density, swarm effect, environment complexity, et al. Speed variation dynamically changes the car-to-car distances frequently and results in broken connections. Besides, VANET's network topology usually deployed along with the roadside, the nearby car is very probably...
In sensor network applications, data gathering mechanisms, which are based on multi-hop forwarding, can be expensive in terms of energy. This limitation challenges the use of sensor networks for applications that demand a predefined operational-lifetime. To avoid this problem, using of mobile element (ME) as a mechanical data carrier has emerged as a promising approach. However, practical considerations...
MILSA (Mobility and Multihoming supporting Identifier Locator Split Architecture) is a new architecture to address the naming, addressing, and routing challenges in the current Internet. It separates the identifier (ID) from locator, separates control from data delivery, and provides comprehensive benefits in routing scalability, mobility and multihoming, traffic engineering, renumbering, and policy...
A mobile ad hoc network (MANET) operates much depending on node's willingness to cooperate in the network. A node's misbehavior can have severe impact in overall network performance. One of the different kinds of misbehavior a node may exhibit is malicious packet dropping. In this paper, we focus on detecting and excluding nodes that misbehave by dropping some or all packets forwarded through them...
Security is extremely important for the deployment of a mobile ad-hoc networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However,...
The term Organic Computing is that the system you used having the Self-X properties and autonomously. Self-organization and self-configuration will be automatically performing some mechanisms after system constructed. Self-healing when the mal-function operates or damaged the system. Self-optimization when system found a way that could be better than it is now. And context-aware is that when the working...
We present AIR (automatic incremental routing), a unified approach for scalable unicast and multicast routing in mobile ad hoc networks (MANET). In AIR, nodes run a distributed routing algorithm to assign prefix labels to themselves. The labels are assigned such that routing to unicast or multicast destinations is automatic, in that a route from any node to a destination is defined by the node's prefix...
Relaying in mobile wireless networks is known as an appropriate solution for a large number of network planning problems. However, in a number of relaying cases, mobile stations (MS's) have a limited forwarding capability and each MS can participate in a limited number of connections. When MS's have a limited forwarding capability a number of routes may be blocked. Path blocking causes significant...
This paper proposes a distributed energy-efficient routing algorithm for mobile Ad Hoc networks (MANETs). We adopt the cross-layer design paradigm. The distance from the source node to the destination node is estimated based on the received signal strength indication (RSSI) of the packets and is used to adaptively adjust the backoff time of the MAC layer. A distance threshold and a packet count threshold...
We propose multicast extensions to the flow oriented routing protocol (M-FORP) and node velocity based stable path (M-NVSP) routing protocol for mobile ad hoc networks. M-FORP predicts the link expiration time and connects the source to each of the multicast receivers through paths with the largest predicted expiration time. M-NVSP connects the source to each of the multicast receivers through paths...
Routing in mobile ad hoc networks (MANETs) is central to their proper functioning. Mobility in such networks makes the routing a real challenging task. Routes validity plays a central leveraging mission to enhance network performances. Forwarding through incorrect routes not only results in traffic wandering inside the network without ever being able to be delivered to their ultimate destinations...
Support of P2P communities in mobile environments is a challenging task. To this purpose numerous algorithms have been recently proposed to speed up resource search throughout the network. Among these, structured DHT approaches seem very promising since they allow for a successful resource search by keeping complexity low. One of these techniques denoted as Georoy, was recently proposed with the aim...
Compromised sensor nodes may collude to segregate a specific region of the sensor network preventing event reporting packets in this region from reaching the basestation. Additionally, they can cause skepticism over all data collected. Identifying and segregating such compromised nodes while identifying the type of attack with a certain confidence is critical to the smooth functioning of a sensor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.